Updated sox packages are available for Slackware Linux
New sox packages are available for Slackware 8.1, 9.0, 9.1, 10.0, and -current to fix buffer overflow security issues that could allow a malicious WAV file to execute arbitrary code.
Here are the details from the Slackware 10.0 ChangeLog:
+--------------------------+
Sat Aug 7 17:17:20 AKDT 2004
patches/packages/sox-12.17.4-i486-3.tgz: Patched buffer overflows that could allow a malicious WAV file to execute arbitrary code. (* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/sox-12.17.4-i386-3.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/sox-12.17.4-i386-3.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/sox-12.17.4-i486-3.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/sox-12.17.4-i486-3.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/sox-12.17.4-i486-3.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
08b8e2ba8d34b959c18130bbb44c2fcd sox-12.17.4-i386-3.tgz
Slackware 9.0 package:
3a206a1a0688b4bfd0f464bb40128339 sox-12.17.4-i386-3.tgz
Slackware 9.1 package:
13beadd4d7e48c19af71e3ffb6a0578e sox-12.17.4-i486-3.tgz
Slackware 10.0 package:
71919b40bcb0a6f3fc3c9361e0cdbc6f sox-12.17.4-i486-3.tgz
Slackware -current package:
71919b40bcb0a6f3fc3c9361e0cdbc6f sox-12.17.4-i486-3.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg sox-12.17.4-i486-3.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
New sox packages are available for Slackware 8.1, 9.0, 9.1, 10.0, and -current to fix buffer overflow security issues that could allow a malicious WAV file to execute arbitrary code.
Here are the details from the Slackware 10.0 ChangeLog:
+--------------------------+
Sat Aug 7 17:17:20 AKDT 2004
patches/packages/sox-12.17.4-i486-3.tgz: Patched buffer overflows that could allow a malicious WAV file to execute arbitrary code. (* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/sox-12.17.4-i386-3.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/sox-12.17.4-i386-3.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/sox-12.17.4-i486-3.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/sox-12.17.4-i486-3.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/sox-12.17.4-i486-3.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
08b8e2ba8d34b959c18130bbb44c2fcd sox-12.17.4-i386-3.tgz
Slackware 9.0 package:
3a206a1a0688b4bfd0f464bb40128339 sox-12.17.4-i386-3.tgz
Slackware 9.1 package:
13beadd4d7e48c19af71e3ffb6a0578e sox-12.17.4-i486-3.tgz
Slackware 10.0 package:
71919b40bcb0a6f3fc3c9361e0cdbc6f sox-12.17.4-i486-3.tgz
Slackware -current package:
71919b40bcb0a6f3fc3c9361e0cdbc6f sox-12.17.4-i486-3.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg sox-12.17.4-i486-3.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com